ARTICLES

Why India Banned Dozens of Chinese Apps

India recently banned TikTok, and dozens of other Chinese apps. Read on to know more... After a deadly clash between Indian and Chinese army this...

How Hackers Use Fake Windows Error Logs to Hide Malicious Payload

Recently, security researchers discovered hackers usage of fake Windows error logs to hide malicious payload. Read on to know more... Hackers have continued to devise...

Why Google Banned More than 30 Android Apps from Play Store

Recently, Google has removed more than 30 popular Android apps from its Play Store. Read on to know more about it... Recently, Google has removed...

How Android Apps can be Hacked by Exploiting through Intents

A security researcher compromised an Android application by exploiting through Intents. Read on to know more... Android users often face cybersecurity risks due to vulnerabilities...

NEWS

Chinese malware ‘Golang’ targeting Windows, Linux machines

Source: IANS Cyber-security researchers have identified a new variant of cryptominer malware from China-based hackers that is targeting both Windows and Linux machines. Called Golang, the...

Cynet Announces $18M Funding Round

Deutsche Telekom Invests in $18m Series B+ Round in Autonomous Breach Protection Company Cynet The Telekom Innovation Pool (TIP), Deutsche Telekom’s strategic investment fund advised...

Countries where hackers earn most

Source: TNN According to a report by HackerOne, in 2019, hackers earned nearly $40 million in bounties, almost equal to the entire amount awarded in...

Google tweaks privacy settings to keep less user data

Source: PTI The search giant said that starting Wednesday, it will automatically and continuously delete web and app activity and location history for new users...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Why Internet Isolation is the Key to Cyber Security

Isolation of Internet from the corporate network can secure the key digital assets of organization. Read on to know why Internet isolation is the...

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...

EVENTS

GISEC 2020 – Event Information

The Gulf Information Security Expo & Conference (GISEC) 2020, event, would be held on 1 - 3 September 2020, from 10am - 6pm, at...

RSA Conference 2020 – San Francisco

RSA Conference 2020 San Francisco | February 24 - 28 | Moscone Center How do busy cybersecurity professionals stay on top of basic frameworks and emerging...

RSA Conference 2019 – Asia Pacific & Japan

RSA Conference 2019 Asia Pacific & Japan Marina Bay Sands | Singapore 16 – 18 July As the region's leading cybersecurity event, RSA Conference 2019 Asia Pacific...